Analysis
-
max time kernel
87s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 13:50
Static task
static1
Behavioral task
behavioral1
Sample
c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe
Resource
win7-20220812-en
General
-
Target
c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe
-
Size
1.2MB
-
MD5
37c143bd56ecfe511d90d06da76ade93
-
SHA1
25078f86a10f251aad286ce81a7fcc72d3c28851
-
SHA256
c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa
-
SHA512
76bacf4078c5037520e65288973751e9d6ce9e05c96e3396f21e30cbec86b225d94e44e8d0df92d29e4b19aa8b9bf8dbcccef53d929903c21bd83414c200a4ac
-
SSDEEP
24576:0mpkkZ7iYtU+wkxEbjw3I+g+qYsmj2BN:l6kZ7iYtEI3I+FWmj
Malware Config
Extracted
formbook
4.1
dka
dollvador.com
aartigemsandjewellers.com
nbmiaojiang.com
thecharcuteriestop.com
fmldmlfdfmlfmdr.com
tikeok.com
onemoresysadmin.com
digistore-shop.com
chinahhf.com
petagonya.com
f22.info
siddhamedicineshop.com
vtiqb0.icu
sex-lesson.com
informationnelchamanique.com
bluewaterssportfishing.com
kmresults.com
jambokid.com
amplion.tech
thepaperstorw.com
ingeeneer.com
citest1597729706.com
ruangsepeda.com
yx1889.com
skingloves.com
whbing.com
deepdewood.com
romidotcom.com
rhodeislandhealthwellness.info
nextgenloan.com
propertyhubcity.com
elarabiatrading.com
sisuidrottsmassage.com
zwisdom.com
glorytextiles.com
kavoceat.com
hareemshareem.com
uandidesign.store
xn--fte-fma.agency
morselsofhome.com
nationalmedtechmixer.com
badgirlbag.com
c2d.info
retireditgeek.com
bbacco.com
yoonymax.com
aldoniasea.com
uyhams.com
unam.tech
greenworldbay.com
marketads.net
solatinteraktif.com
lfmschool.com
ztcj.net
hzinfilt.com
cz9988.com
linyuanlinnong.com
kspindustries.com
zoommakeovers.com
kaafstore.com
eledtrik.com
toraya-bio.com
rentcallcenter.com
musicfriendsandmusic.com
austinrealestateinformation.com
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/940-63-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/940-64-0x000000000041EB70-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exedescription pid process target process PID 2036 set thread context of 940 2036 c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exepid process 940 c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exedescription pid process target process PID 2036 wrote to memory of 1748 2036 c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe schtasks.exe PID 2036 wrote to memory of 1748 2036 c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe schtasks.exe PID 2036 wrote to memory of 1748 2036 c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe schtasks.exe PID 2036 wrote to memory of 1748 2036 c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe schtasks.exe PID 2036 wrote to memory of 940 2036 c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe PID 2036 wrote to memory of 940 2036 c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe PID 2036 wrote to memory of 940 2036 c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe PID 2036 wrote to memory of 940 2036 c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe PID 2036 wrote to memory of 940 2036 c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe PID 2036 wrote to memory of 940 2036 c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe PID 2036 wrote to memory of 940 2036 c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe"C:\Users\Admin\AppData\Local\Temp\c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\beOxSyVXoI" /XML "C:\Users\Admin\AppData\Local\Temp\tmp365D.tmp"2⤵
- Creates scheduled task(s)
PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe"C:\Users\Admin\AppData\Local\Temp\c411a390b1b6d2a1f0673c449aaffccc6dcc258b0a165d7e609ef163c4fb42fa.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:940
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f7e988c6007343f590658c5b5ba275da
SHA1b03ffee1903a8043fc20df8082f710dc27e36aeb
SHA256a5a9eba58342c68ca212fb7ffe47e427e0fdf22a99af24e5a4627d3fedeb5b38
SHA5127f563a376e686886be2eaa78cb8ab832324356af0c2fc334981985896f226fcf5a17bbe7c4e64e1640a3a1e590066799bc050827d1ca9e79b83c1801bdbfb295